Are:
> Each node would then try to connect to yahoo a few times each
> before it would fall out of the node ref tables. Giving yahoo a
> mild DOS attack..

Yeah, it's a way to launch an anonymous DoS attack. The attacker's
objective is to reset as many datasources as possible with a minimum
of effort. He'd probably actively build a database of popular keys,
so he can DataNotFound requests for large files, and immediately
fulfill requests for small files.

He also wants to maximize the number of hops between him and the
request initiator - the more nodes caching his bogus datasource, the
better. I can't think of any heuristic to do that at the moment.

Anyway... I don't think we can do anything to avert this attack.
Sure, other nodes could notice that most of the attacker's
datasources are bogus and blacklist him, but we all know Oskar's
rule - no negative trust in cyberspace. The attacker can switch to a
different address without much interruption.

Personally, I'm more concerned with how much routing can be damaged
by resetting the datasource to, say, a random node.

_______________________________________________
freenet-tech mailing list
[EMAIL PROTECTED]
http://lists.freenetproject.org/mailman/listinfo/tech

Reply via email to